Skip to main content

Posts

Showing posts from October, 2015

Featured Post

Kali Linux Terminal Customization Tutorial

Today I'll show you guys how to change kali linux terminal header text.

[Bank Transfer Tutorial] ID Manufacturing

How To Make A Perfect Teslin ID, Tutorial: Chapter 1 - Items/Supplies Needed Chapter 2 - Templates/Editing Chapter 3 - Printing Chapter 4 - Laminating Chapter 5 - Finishing Touches Chapter 1 - Items/Supplies Needed Many supplies are needed in order to create a valid real looking license. Let's first begin with the basic supplies needed. You will first you need to get an exacto knife, I prefer the ones with the rubber handles, makes it easier on the hand when you are cutting the teslin. Scissors, a nice clean, sharp pair works perfectly fine. The kind that your teacher never let you use in elementary school is the best one to use. Sandpaper, will also be needed, 1000 and 1500 grit is suggested. A cutting board, this comes in handy when you don't want to leave slice marks in on a desktop ( http://www.brainstormidsupply.com ). Laminator, this one I will go into detail about. Choosing the right laminator is very important, personally I prefer the

[Bank Transfer Tutorial] Prepaid Card Cashout

1. You will goto card.com and get a prepaid card with checking acc using the bank logs info to sign up with, only change the billing address to your drop address. It will take 3-5 days for you to receive and activate the card but you can deposit after registration is successfull. And as far as you havent caused any changes on the account, the owner will not be notified. 2. Go to venmo and register an account with the prepaid account details. Verify the venmo acc with the ssn and dob. 3. After a day, add the prepaid account to your venmo acc and verify it. Add the bank log details to the venmo acc and verify it. Two days gone. 4. On the third day, load less than $11,000 in your venmo balance. 5. On the next day, cashout less than $10000 into your prepaid account. the money is yours. 6. The mail containing the card would have reached your drop. Activate it online and cashout immediately. Warning. 1. Prepaid cards take only $10,000 and less. If more than $1000

[Bank Hacking] Research Post

Of eight respected computer security experts consulted for this article, all agreed that hacking into a bank was doable, and most insisted it wouldn't be all that hard. "If I were going into e-crime, I'd hit a bank," says Jon David, a security guru who has worked in the field for 30 years. Why haven't banks been hacked, then? Oh, but they have--big time. In 1994, a 24-year-old programmer in St. Petersburg, Russia, named Vladimir Levin hacked Citibank for $10 million. He was later caught, extradited to the United States and is serving a three-year sentence. (All but $400,000 of the money was recovered.) This sort of thing happens often but is hushed up, according to Michael Higgins, a former analyst with the Defense Intelligence Agency and now a financial computer security consultant who heads Para-Protect in Alexandria, Virginia. The federal government requires banks to report losses, but Higgins says banks avoid potentially bad publicity by reportin

[Security Tutorial] PC Security

An important aspect of securing any system is the concept of “defense-in-depth,” or having multiple layers of security and not depending on any one approach or technology to block all attacks. Here are some links to tools and approaches that I have found useful in stopping malware from invading a PC. Your mileage may vary. Learn, Memorize, Practice the 3 Rules :: Follow Tuxedo's 3 Basic Rules for online safety, and you will drastically reduce the chances of handing control over your computer to the bad guys. In short, 1) If you didn’t go looking for it, don’t install it; 2) If you installed, update it. 3) If you no longer need it, get rid of it! For more on these rules, check out this blog post. Keep Up-to-Date with Updates! It shouldn’t be this way, but the truth is that most software needs regular updating. As a result, staying on top of the latest security updates can sometimes feel like a nagging chore. Not all software includes auto-update features tha

[Security Tutorial] Advanced Anonymity Tips

Sometimes one approach is not sufficient by itself to both protect your identity and grant you access to all the services you would like. For example, Tor does not carry UDP traffic, nor is it really an all-encompassing VPN solution, which can lead to lots of problems with browser plugins ignoring your proxy settings, spyware, webbugs, etc. In some cases, it is also not possible to use Tor to connect to services due to banning. In other cases, it may actually be desirable to conceal the fact that you are exiting from the Tor network to protect it from abuse complaints, which usually have the side effect of forcing Tor nodes to shut down. Tor followed by HTTP Proxy   This is probably the easiest way to conceal the fact that you came from the Tor network. If you are using Privoxy, you can chain a regular HTTP proxy from a list mentioned above (this one provides IRC capable proxies, while this one automatically builds a list of currently active "high-ano

[Hacking Tutorial] Important Hacking Questions And Answers

Lets have a quick recap on all the previous tutorials. Here is a quick question and answer to help you revise all that you have learnt so far. Q: What is hacking? A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime Q: What is cracking? A: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administrati

[Hacking Tutorial] Different Types Of Wireless Attacks

Types of Wireless Attacks Standard wireless communication occurs when the end user and the wireless access point are able to communication on a point-to-point basis without interruptions. There are many attack variations in existence against wireless networks that breaks the standard communication format. These attacks includes the denial of service attacks, the man in the middle attacks and the WEP key-cracking attack to name a few and are described below. Denial of Service (DoS) attacks The objective of a Denial of Service (DoS) attack is to prevent authorized users access to legitimate network resources by denying them service. A DoS occurs when the malicious attacker sends an abundant of garbage data to the wireless access point choking all other communications to legitimate users. Man-in-the-middle attacks A man-in-the-middle attack consists of a malicious user (hacker) inserting themselves into the data path between the client and the AP. In such a pos

[Hacking Tutorial] How To Upload Shells Successfully

Hello all This post is for people who fail to upload shell onto websites Try these methods below Method 1: we all know that uploading scripts accepts JPG or GIF or both etc.. so its possible some times to bypass it by renaming the file to " shell.jpg.php " Method 2: Sometimes we can upload PHP file by editing the parameters with tools such as Tamper Data ( Firefox Addon ) Download Here: Code: https://addons.mozilla.org/en-US/fir...n/tamper-data/ Change the application/octet-stream to image/gif or image/jpg Video tuorial: http://www.youtube.com/watch?v=OB5iQI5SkTw However, that works on some scripts... Method 3: We can also upload shell by adding to the file name %_00 shell.jpg%00php shell.jpg%.php or shell.jpg;php (works alot specially on Win box'z ) Method 4: Another way is by tricking Apache by adding PHP languages For Example: file.php.en the Apache will read the file.php.en as a normal php file cause .en re

[Hacking Tutorial] How To get A Free VPS

Go to interserver.net Then To "VPS & Cloud" Then at buttom Select Os as Windows Then Select No. Of Slicies as 2 Location as any u want Click Buy Now Then Sign-Up Now when u sign-up then during checkout it fill the coupon "1cent" ( without "" ) Now Checkout and purchase it for $0.01 Paypal When u Login Wait for vps to get started now Now go to System Mangement & Click "Setup VNC" Wait for 2 Minutes. Now Again Go to System Mangement & Click "Java VNC" (Now u need java here ) then it will ask u to set new password (Save that password we will need it after some time ) Now Again go to VPS information Note IP address there then Start > Accessories > Remote desktop Connection Paste IP Address in Computer Textfield & click connect. Username as Adminstrator password which u set in java VNC. BOOM FREE VPS FOR 1 MONTH.

[Hacking Tutorial] Backdoors Fully Explained

What is a Backdoor? To put it more simply, if you have a Backdoor program installed on your computer, a remote user anywhere in the world can: Gain Access to Anything on your Computer Log Keystrokes on your Computer Capture Passwords Use your Computer to do Everything you Can do on your Computer Use your Computer to do Things you can’t do on Your Computer Transfer Files to and from Your Computer Launch Attacks on other Computer Systems Leave no Outward Trace that Anyone else Has Access to Your System. How does a computer end up with a Backdoor program? Backdoors are Similar to Trojan. They can come disguised as a component of a program. Often they are sent knowingly or unknowingly disguised as games, utilities, applications or other programs. When the infected program is run, the backdoor will typically install itself within seconds. It will erase the original, and then may run a specific program. The user who has inadvertently installed the backdoor

[Hacking Tutorial] SMTP Fully Explained

SMTP Protocol: Index: What is SMTP? How it works. How to send (fake) email through an SMTP server. How to add subject, etc. in mail. Attachments. Fully functional Mailer.java   1. What is SMTP? SMTP stands for "Simple Mail Transfer Protocol". It is a fairly simple protocol (hence the name!) used to send and relay email through the Internet. The protocol is implemented on mail servers, like Sendmail or Postfix. These servers usually listen on port 25[*]. It is a clear-text protocol, meaning a human can connect to such a server and issue the commands manually. This also means the message can be sniffed as it is sent without encryption to the server.[*] What is a port? You may be aware of the comm and parallel ports on your computer, that you might connect a modem and printer to. There are also many software ports on your computer, identified by numbers, which various services run on. For example, to receive a web page, your computer contac